security

5 SSH Hardening Tips

When you look at your SSH server logs, chances are they are full of attempted logins from entities of ill intent. Here are 5 general ways (along with several...
Read 0 Comments

NFV and Cloud Driving Changes in Core Network Licensing Models

As telecom operators move towards NFV, SDN and cloud architectures, licensing models will need to adapt to new deployment methods One of the greatest...
Read 0 Comments

DevOps Done Right: Five Tips for Implementing Database Infrastructures

But while DevOps can provide many improvements throughout all stages of the development lifecycle, it is imperative to avoid some of the common pitfalls. A...
Read 0 Comments
Process tree

Make Peace With Your Processes: Part 5

In previous articles in this series, we’ve whet our whistles with a quick look at the Process Table and pseudo filesystems, and we talked about /dev and /proc...
Read 0 Comments

Using Nano-Segmentation Apcera Looks to Bring Cloud Trust to Docker Container Deployment

Highly secure trusted cloud platform provider Apcera, Inc. today announced the release of its own approach to securely managing Docker containers in production...
Read 0 Comments

Can IBM Really Make a Business Out of Blockchain?

On Tuesday, IBM announced the formal launch of a so-called “Bluemix Garage” in New York, where developers can experiment with financial-tech software and...
Read 0 Comments

MongoDB Launches Atlas, Its New Database-as-a-Service Offering

MongoDB, the company behind the eponymous open source database, is launching Atlas today, its third major revenue-generating service. Atlas is MongoDB’s...
Read 0 Comments

Pages